Sep 22, 2022

Supporting On-Demand Access with Twingate and Opal

Opal works better together with Twingate to provide a holistic zero trust architecture

Eugene Ling
Head of Growth
Kudos to
No items found.

Today, we’re excited to announce the new Twingate + Opal integration! Twingate replaces your legacy VPNs with a modern Zero Trust Network that’s easy to adopt and loved by your workforce.

Supporting fast growing companies, such as Blend, Chargebee, Hippo, and Bloomreach, Twingate helps companies move towards a Zero Trust architecture by tying every network event to an identity—user, device, and service—giving businesses modern control and visibility over activity across their entire network. It can be set up in less than 15 minutes and integrates with all major cloud providers and identity providers.

With the Twingate + Opal integration you can:

  • Allow users to request short-lived just-in-time access to infrastructure and applications from web and Slack
  • Delegate approvals and management to system owners and managers with the most context
  • Configure powerful governance policies for sensitive access
  • Automatically escalate and revoke privileged resource access based on on-call schedules e.g. PagerDuty or Opsgenie

Twingate and Opal: Better Together

Customers have leveraged Twingate and Opal together for a holistic zero-trust architecture both inside their network and across their applications and infrastructure. Zero trust is a powerful concept in network security where, by default, no access is given and no source is trusted. Implementing zero trust is challenging but when done correctly, it fortifies organizations against attack by limiting their attack surface.

Before Twingate, teams would manage multiple VPN solutions with inconsistent rules around who has access – resulting in a lack of transparency and consistency. Twingate enables companies to scale by simplifying network access controls with an easy deployment process that is seamlessly integrated with Okta and Terraform.

As with zero trust solutions, Opal implements the principles of limiting and continuously verifying access. Opal’s focus is managing resources outside the network layer, including developer infrastructure, identity provider groups and third-party SaaS roles. With Opal, employees are assumed by default to be unvetted. Access, for the most part, is not automatically granted and must be manually requested using Opal’s seamless workflows via web or Slack. Once granted, access is continuously re-certified, either because the access grant was short-lived or as part of periodic compliance reviews.

How to use Twingate and Opal

  1. Install the Opal integration for Okta
  2. Setup your Twingate Okta integration
  3. Start granting just-in-time access!

Any questions? Feel free to reach out and we’re happy to schedule time for a demo!

Eugene Ling

Interested in Opal?

Get in touch with our team to learn more!

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.